Abstract
Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propose a network blocking algorithm and architecture, which provides a comprehensive, host-by-host perspective on IP over Ethernet network security. The proposed system is also an effective tool for managing network resources containing IP address, MAC address and hostname, etc. under diverse and complicated network environment. Therefore, we will be able to enhance local network security on the wired and wireless environment with the network resource and security management system based on our proposed framework.
This paper was supported by 63 Research Fund, Sungkyunkwan University, 2004
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellovin, S.M.: Security Problems in the TCP/IP Protocol Suite. Computer Communication Review 19(2), 32–48 (1989)
Plummer, D.C.: An Ethernet Address Resolution Protocol. RFC 826 (November 1982)
Comer, D.: Internetworking with TCP/IP, 4th edn. Principles, Protocols, and Architecture, vol. 1. Prentice Hall, Englewood Cliffs (2000)
Braden, R.: Requirements for Internet Hosts – Communication Layers. RFC 1122 (October 1989)
Stevens, Richard, W.: TCP/IP Illustrated. The Protocols. Reading, vol. 1. Addison-Wesley, Reading (1993)
Davies, J., Lee, T.: Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference. Microsoft Press (2003)
Maxim, M., Pollino, D.: Wireless Security. RSA Press (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koo, J., Ahn, S. (2005). A Network Service Access Control Framework Based on Network Blocking Algorithm. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_8
Download citation
DOI: https://doi.org/10.1007/11553939_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)